Now showing items 1-6 of 6

    • Designing PhelkStat: Big Data Analytics for System Event Logs 

      Salman, Mohammed; Welch, Brian; Raymond, David; Marchany, Randy; Tront, Joseph (HICSS Symposium on Cybersecurity Big Data Analytics, 2017-01-04)
      With wider adoption of micro-service based architectures in cloud and distributed systems, logging and monitoring costs have become increasingly relevant topics of research. There are a large number of log analysis tools ...
    • Implementing an IPv6 Moving Target Defense on a Live Network 

      Dunlop, Matthew; Groat, Stephen; Marchany, Randy; Tront, Joseph (Cyber-Physical Systems Virtual Organization, 2012)
      The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
    • Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid 

      Sherburne, Matthew; Marchany, Randy; Tront, Joseph (ACM Press, 2014)
      The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
    • Network Security Data Analytics Architecture for Logged Events 

      DeYoung, Mark E.; Marchany, Randy; Tront, Joseph (2017-01-04)
      Data-driven network security and information security efforts have decades long history. The deluge of logged events from network mid-points and end-points coupled with unprecedented temporal depth in data retention are ...
    • Privacy Preserving Network Security Data Analytics: Architectures and System Design 

      DeYoung, Mark E.; Kobezak, Philip; Raymond, David; Marchany, Randy; Tront, Joseph (University of Hawaii at Manoa, 2018-01-03)
      An incessant rhythm of data breaches, data leaks, and privacy exposure highlights the need to improve control over potentially sensitive data. History has shown that neither public nor private sector organizations are ...
    • Security and Privacy produced by nHCP Unique Identifiers 

      Tront, Joseph; Groat, Stephen; Dunlop, Matthew; Marchany, Randy (IEEE, 2011-10)
      As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...